{"id":843,"date":"2024-05-15T14:25:00","date_gmt":"2024-05-15T14:25:00","guid":{"rendered":"https:\/\/news.cybertechworld.co.in\/index.php\/2024\/05\/15\/cyber-risk-probability-of-occurrence-x-damage\/"},"modified":"2024-05-15T14:25:00","modified_gmt":"2024-05-15T14:25:00","slug":"cyber-risk-probability-of-occurrence-x-damage","status":"publish","type":"post","link":"https:\/\/news.cybertechworld.co.in\/index.php\/2024\/05\/15\/cyber-risk-probability-of-occurrence-x-damage\/","title":{"rendered":"(Cyber) Risk = Probability of Occurrence x Damage"},"content":{"rendered":"<p>\u200bHere\u2019s How to Enhance Your Cyber Resilience with CVSS<br \/>\nIn late 2023, the Common Vulnerability Scoring System (CVSS) v4.0 was unveiled, succeeding the eight-year-old CVSS v3.0,\u00a0with the aim to\u00a0enhance vulnerability assessment for both industry and the public. This latest version introduces additional metrics like safety and automation to address criticism of lacking granularity\u00a0Here\u2019s How to Enhance Your Cyber Resilience with CVSS<br \/>\nIn late 2023, the Common Vulnerability Scoring System (CVSS) v4.0 was unveiled, succeeding the eight-year-old CVSS v3.0,\u00a0with the aim to\u00a0enhance vulnerability assessment for both industry and the public. This latest version introduces additional metrics like safety and automation to address criticism of lacking granularity\u00a0\u00a0The Hacker News<\/p>","protected":false},"excerpt":{"rendered":"<p>\u200bHere\u2019s How to Enhance Your Cyber Resilience with CVSS In late 2023, the Common Vulnerability Scoring System (CVSS) v4.0 was unveiled, succeeding the eight-year-old CVSS v3.0,\u00a0with the aim to\u00a0enhance vulnerability assessment for both industry and the public. This latest version introduces additional metrics like safety and automation to address criticism of lacking granularity\u00a0Here\u2019s How to&hellip;&nbsp;<a href=\"https:\/\/news.cybertechworld.co.in\/index.php\/2024\/05\/15\/cyber-risk-probability-of-occurrence-x-damage\/\" class=\"\" rel=\"bookmark\">Read More &raquo;<span class=\"screen-reader-text\">(Cyber) Risk = Probability of Occurrence x Damage<\/span><\/a><\/p>\n","protected":false},"author":0,"featured_media":844,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"neve_meta_sidebar":"","neve_meta_container":"","neve_meta_enable_content_width":"","neve_meta_content_width":0,"neve_meta_title_alignment":"","neve_meta_author_avatar":"","neve_post_elements_order":"","neve_meta_disable_header":"","neve_meta_disable_footer":"","neve_meta_disable_title":"","_themeisle_gutenberg_block_has_review":false,"footnotes":""},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/posts\/843"}],"collection":[{"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/types\/post"}],"replies":[{"embeddable":true,"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/comments?post=843"}],"version-history":[{"count":0,"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/posts\/843\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/media\/844"}],"wp:attachment":[{"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/media?parent=843"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/categories?post=843"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/tags?post=843"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}